EasyManua.ls Logo

Allied Telesis AT-9000/28SP - Overview; Algorithms

Allied Telesis AT-9000/28SP
1482 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 82: Secure Shell (SSH) Server
1330
Overview
The Secure Shell (SSH) protocol is an alternative to the Telnet protocol for
remote management of the switch from workstations on your network. The
difference between the two management methods is that SSH
management is more secure because the packets the switch and your
management workstation exchange during management sessions are
encrypted. In contrast, Telnet management sessions are unsecured and
are vulnerable to snooping because the packets are sent in readable text.
The SSH server on the switch supports SSH protocol versions 1.3, 1.5,
and 2.0. Client software is available on the Internet.
Algorithms The SSH server on the switch encrypts the packets using an encryption
key. The key is created with an algorithm. You can choose from three
available algorithms to create the key for SSH:
RSA
RSA1
DSA

Table of Contents

Other manuals for Allied Telesis AT-9000/28SP

Related product manuals